LockBit Claims Ransomware Attack on Continental
The ransomware gang made the announcement on its leak site
Cyber News, Cyber Threat TrendsThe ransomware gang made the announcement on its leak site
Cyber News, Cyber Threat TrendsNot too long ago, there was a clear separation between the operational technology (OT) that drives the physical functions of a company – on the factory floor, for example – and the information technology (IT) that manages a company’s data to enable management and planning. As IT assets became increasingly connected to the outside world […]
Cyber News, Cyber Threat TrendsThe Transparent Tribe threat actor has been linked to a new campaign aimed at Indian government organizations with trojanized versions of a two-factor authentication solution called Kavach. “This group abuses Google advertisements for the purpose of malvertising to distribute backdoored versions of Kavach multi-authentication (MFA) applications,” Zscaler ThreatLabz researcher Sudeep Singh said
Cyber News, Cyber Threat TrendsThe NSA (together with CISA) has published a long report on supply-chain security: “Securing the Software Supply Chain: Recommended Practices Guide for Suppliers.“: Prevention is often seen as the responsibility of the software developer, as they are required to securely develop and deliver code, verify third party components, and harden the build environment. But the […]
Cyber News, Cyber Threat TrendsThe proportion of cyber-attacks perpetrated by nation states targeting critical infrastructure jumped from 20% to 40%
Cyber News, Cyber Threat TrendsACM.101 Configuring network and host firewalls on home and business networks to allow SSH to an AWS IP address This is a continuation of my series on Automating Cybersecurity Metrics. In the last post, we deployed an EC2 instance configured with an EIP on AWS. Deploying an AWS Elastic IP Address If you’ve done that, now you […]
Cyber News, Cyber Threat TrendsUK regulator reduces penalty by 90%
Cyber News, Cyber Threat TrendsWelcome back! Previously in our Go Dox Yourself series, we walked through reviewing what information is available about you online, prioritizing those accounts that are most important or still active, and then restricting how much we share through those accounts and who gets to see it. That’s two out of our three steps — maybe good […]
Cyber News, Cyber Threat TrendsAvanan spots campaign leveraging Dynamic 365 Customer Voice
Cyber News, Cyber Threat Trends